Introducing the SSL Client Test
Last updated on: October 21, 2021
I am delighted to introduce the most recent addition to the SSL Labs web site, the SSL Client Test. For some reason, even though we released sslhaf, our passive client fingerprinting tool, back in 2009, our attention until now remained on server testing only.
Then, this year, there was a noticeable increase in the interest in computer security and browser capabilities specifically, which led many of our users to ask us to implemented a client test. We already had a page that displayed the capabilities of well known browsers (linked from the Handshake Simulator section); from there, it was really easy to show what your browser can do.
Behind the scenes we rely on sslhaf to extract the entire raw client handshake request and make it available to our application (implemented in Java). From there, we simply disassemble the available information and present it to the user.
With the client test, you are now able to see the SSL/TLS capabilities of your preferred browser simply by visiting the test page. And, because the SSL protocol is designed in such a way that clients always tell servers about their capabilities, the best part is that testing does not take much time. In fact, it’s pretty much instantaneous.
I’ve had a similar idea a while ago: https://tlsinfo.nails.eu.org/ :-)
Hi there, my mate is trying to access your test from his smartphone as his SSL doesn’t work with most websites, but that includes your website. Could you make your test available over cleartext HTTP? Thanks.
Here’s his user-agent: Mozilla/5.0 (SymbianOS/9.3; Series60/3.2 NokiaC5-00.1/075.001; Profile/MIDP-2.1 Configuration/CLDC-1.1 ) AppleWebKit/533.4 (KHTML, like Gecko) BrowserNG/188.8.131.52 Mobile Safari/533.4 3gpp-gba
The Qualys site certificate is currently marked as insecure by Chrome Canary (M70+), due to distrusting certain Symantec certificates. Oh, the irony!
We are in the process of fixing this.